[19132] in Kerberos

home help back first fref pref prev next nref lref last post

Re: key salting and kerberos v5

daemon@ATHENA.MIT.EDU (Tom Yu)
Mon Apr 28 01:48:38 2003

To: Sam Hartman <hartmans@mit.edu>
From: Tom Yu <tlyu@MIT.EDU>
Date: Mon, 28 Apr 2003 01:47:54 -0400
In-Reply-To: <tslk7dfjy24.fsf@konishi-polis.mit.edu> (Sam Hartman's message
 of "Sun, 27 Apr 2003 19:54:59 -0400")
Message-ID: <ldvk7df6ulx.fsf@cathode-dark-space.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
cc: kerberos@mit.edu
cc: Calimer0 <cryos98@yahoo.com>
Errors-To: kerberos-bounces@mit.edu

>>>>> "Sam" == Sam Hartman <hartmans@MIT.EDU> writes:

Sam> It is.  Kadmin should really say default salt not no salt.  That's
Sam> what it actually means.

Sam> It says no salt because there is no salt tuple associated with the key
Sam> entry.  When no such tuple exists, then the default salt is used.

Further confusing matters, the MIT KDC doesn't distinguish between a
key having the default salt and a key having no associated password
(e.g. a service principal's random key).  In the latter case, "no
salt" actually makes some amount of sense, though it's more accurately
"no user-typable password".  For both cases, though, the KDC stores no
salt data in the record for the key in question.

---Tom
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post